CN116933157A - Electricity larceny detection method - Google Patents

Electricity larceny detection method Download PDF

Info

Publication number
CN116933157A
CN116933157A CN202310892201.6A CN202310892201A CN116933157A CN 116933157 A CN116933157 A CN 116933157A CN 202310892201 A CN202310892201 A CN 202310892201A CN 116933157 A CN116933157 A CN 116933157A
Authority
CN
China
Prior art keywords
electricity
period
electric energy
detection
detection period
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310892201.6A
Other languages
Chinese (zh)
Inventor
刘刚
石晶磊
陈龙
范伟健
张琦
李鹏飞
范宏伟
唐翠翠
王东
冀章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Shandong Electric Power Co Mengyin County Power Supply Co
Original Assignee
State Grid Shandong Electric Power Co Mengyin County Power Supply Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Shandong Electric Power Co Mengyin County Power Supply Co filed Critical State Grid Shandong Electric Power Co Mengyin County Power Supply Co
Priority to CN202310892201.6A priority Critical patent/CN116933157A/en
Publication of CN116933157A publication Critical patent/CN116933157A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R22/00Arrangements for measuring time integral of electric power or current, e.g. electricity meters
    • G01R22/06Arrangements for measuring time integral of electric power or current, e.g. electricity meters by electronic methods
    • G01R22/061Details of electronic electricity meters
    • G01R22/066Arrangements for avoiding or indicating fraudulent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/18Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Databases & Information Systems (AREA)
  • Public Health (AREA)
  • Artificial Intelligence (AREA)
  • Probability & Statistics with Applications (AREA)
  • Software Systems (AREA)
  • Power Engineering (AREA)
  • Operations Research (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Computation (AREA)
  • Algebra (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Emergency Alarm Devices (AREA)

Abstract

The application belongs to the technical field of power systems, and particularly relates to the field of electric energy management, in particular to an electric larceny detection method. When a theft behavior is detected, the user who has not used electricity for the detection period is first removed. Then, the total value Wyyz of all the electricity utilization users and the total power consumption Wz of the station area in the period are calculated. And finally, calculating a suspected electricity larceny value Wqj, comparing the suspected electricity larceny value with an electricity larceny early warning threshold Wqx, and judging whether the electric meter is an electricity larceny meter according to the comparison result. The application can rapidly detect the electricity stealing behavior and determine the electricity meter for electricity stealing, thereby avoiding the loss of the interests of companies. Meanwhile, the workload of detecting electricity meter stealing one by one when going out is reduced, the detection efficiency is improved, and the labor intensity of staff is reduced.

Description

Electricity larceny detection method
Technical Field
The application relates to the technical field of power systems, in particular to the field of power supply management, and specifically relates to an electricity larceny detection system based on big data analysis.
Background
Although the difficulty of stealing electricity is higher and higher along with the progress of the electricity larceny prevention technology of the electric energy meter, the electricity larceny behavior cannot be avoided. Meanwhile, the electricity stealing behavior is more hidden, most of the time cannot be found, and some electricity stealing behaviors have intermittent electricity stealing behaviors, so that the difficulty of electricity stealing is more difficult. Currently, in the case of detecting electricity theft, it is often necessary for a specialist to go to the site to survey and find out the electricity meter that steals electricity through a detection device. However, the detection of the electric energy meter and the circuit thereof is carried out one meter by one meter. For a district, often have a plurality of ammeter casees, have a plurality of electric energy meters in every ammeter case, to the steal electric activity of comparatively hiding this moment, because the unable accurate concrete piece that confirms the steal electric energy meter is, consequently when finding professional technical personnel and detecting one by one, can't detect the steal electric energy meter in the first time, and steal electric personnel and remove the steal electricity under the condition that the inspector is careless this moment, consequently bring great degree of difficulty for the investigation steal electricity. Therefore, designing a large data analysis-based electricity larceny detection system capable of accurately analyzing the specific position of an electricity larceny electric energy meter becomes an urgent requirement.
Disclosure of Invention
The application aims to solve the technical problems that: the system for detecting the electricity larceny based on big data analysis is used for accurately analyzing the specific position of the electricity larceny electric energy meter.
The technical scheme for solving the technical problems is as follows: the electricity larceny detection system based on big data analysis comprises a data calling system, a data temporary storage system, a data analysis system and an information feedback system; the data analysis system starts the data retrieval system to extract the electric energy meter data from the power dispatching system after receiving the detection instruction, and the data temporary storage system is used for storing the electric energy meter data read by the data retrieval system and the intermediate data analyzed and calculated by the data analysis system; after the data analysis system transmits the detection result to the information feedback system, the information feedback system transmits the detection result as feedback information to the power dispatching system and the operation and maintenance personnel;
the detection method of the data analysis system comprises the following steps:
step 1, acquiring information of all electric energy meters in a power supply station area, and setting detection power consumption Wj;
step 2, determining an association system according to the electric energy meter information, wherein the association system comprises an aggregate meter and a user meter associated with the aggregate meter;
step 3, assuming that one user table in the association system is a suspicion table, and other user tables are normal tables, wherein i is an integer between [1, n-1], and n is the total number of user tables in the association system;
step 4, acquiring data of a first detection period, and enabling electric energy data WBx =wj of a suspected meter in the first detection period; at this time, the liquid crystal display device,
therein, WBz 1 For the total meter power data in the first detection period, ws 1 For a first detection periodIs the loss data of Bz1 i The electric energy data of each normal meter in the first detection period;
step 5, acquiring data of a second detection period, wherein the second detection period and the first detection period are different periods; simultaneously enabling the electric energy data WBx =wj of the suspicion table in the second detection period; at this time, the liquid crystal display device,
wherein WBz is the electric energy data of the total meter in the second detection period, ws 2 Bz2 for loss data in the second detection period i The electric energy data of each normal meter in the second detection period;
step 6, let ws=μ WBz, and bring the formulas in step 4 and step 5 and compose the formulas in step 4 and step 5 into an equation,
calculated to obtain
Wherein mu 1 Calculating coefficients for the losses when the suspicion table is assumed in step 3;
step 7, repeating the steps 3-6, sequentially taking each user table as a suspicion table and calculating a loss calculation coefficient mu corresponding to the suspicion table j Wherein j is [1, n]An integer therebetween;
step 8, calculating the coefficient mu at the loss j And selecting a minimum value and determining a suspected meter corresponding to the minimum value as an electricity stealing electric energy meter.
Preferably, the electric energy meter information comprises an electric energy meter number, an electric energy meter geographic position, a space position and an electric energy meter function type.
More preferably, the detection power consumption is 1-25 kilowatt-hours.
Preferably, the first detection period and the second detection period are obtained from historical data.
Preferably, a first starting point ts is selected 1 And reads the first starting point ts 1 The data of the suspicion table at the moment;
sequentially reading the data of the suspicion table of the next time period interval point and the first starting point ts by taking the time T as the interval period 1 If the difference is smaller than the detection power consumption, repeatedly reading the data of the suspicion table of the next time period interval point and calculating until the data of the suspicion table and the first starting point ts 1 The difference value of the data of the suspicion table is equal to the detection power consumption, and the time point is taken as a first cut-off point tz 1
First starting point ts 1 And a first cut-off point tz 1 The interval is a first detection interval;
selecting a second starting point ts 2 And reads the second starting point ts 2 The data of the suspicion table at the moment;
sequentially reading the data of the suspicion table of the next time period interval point and the second starting point ts by taking the time T as the interval period 2 If the difference is smaller than the detection power consumption, repeatedly reading the data of the suspicion table of the next time period interval point and calculating until the data of the suspicion table and the second starting point ts 2 The difference value of the data of the suspicion table is equal to the detection power consumption, and the time point is taken as a second cut-off point tz 2
Second starting point ts 2 And a second cut-off point tz 2 The interval is a second detection interval;
wherein the first starting point and the second starting point are different time points.
Better, ts 2 -ts 1 ≥tz 1 -ts 1
Preferably, the first detection period and the second detection period are acquired from real-time data.
Preferably, the electric energy data of the suspicion table at the current moment is read, and the current moment is marked as a first starting pointts 1 The method comprises the steps of carrying out a first treatment on the surface of the Sequentially reading electric energy data of the suspicion table by taking time T as interval period and combining the electric energy data with a first starting point ts 1 Subtracting the electric energy data of the suspected meter at the moment and judging whether the electric energy data is the same as the detection power consumption, if so, continuing to read the electric energy data of the suspected meter at the next interval period; when the electric energy data of the suspicion table is combined with the first starting point ts 1 Stopping timing and marking the time as the first cut-off point tz when the difference value of the detected power consumption is the same 1 First starting point ts 1 And a first cut-off point tz 1 The interval is a first detection interval; in the same way a second starting point ts is determined 2 And a second cut-off point tz 2 And a second start point ts 2 And a second cut-off point tz 2 The inter-period is a second detection period.
Preferably, the electric energy data of the suspicion table are sequentially read by taking the time T as an interval period and are combined with a first starting point ts 1 Subtracting the electric energy data of the suspicion table at the moment and judging that the electric energy data is larger than the starting power consumption Wq, and marking the time point as a second starting point ts if the electric energy data is larger than the starting power consumption 2 The method comprises the steps of carrying out a first treatment on the surface of the Wherein Wq is more than or equal to 0.5Wj.
More preferably, T is 1s, 5s or 10s.
The beneficial effects of the application are as follows: the application can rapidly determine the meter number of the electric energy meter with electricity larceny, determine the specific position of the electric energy meter according to the meter number, timely and accurately reach the site to survey, improve the efficiency and accuracy of electricity larceny prevention and reduce the loss of a power supply system.
Drawings
FIG. 1 is a schematic diagram of the system components of an embodiment of the present application.
FIG. 2 is a flow chart of a method according to an embodiment of the application.
Fig. 3 is a schematic diagram of the various gauges in the correlation system.
In the figure: bz, total table; bz i A normal table; bx, suspicion table; 400. an information feedback system; 300. a data analysis system; 200. a data temporary storage system; 100. a data retrieval system;
Detailed Description
In order to make the technical scheme and beneficial effects of the present application clearer, the following further explain the embodiments of the present application in detail.
The electricity larceny detection system based on big data analysis comprises a data calling system 100, a data temporary storage system 200, a data analysis system 300 and an information feedback system 400. The electricity larceny detection system is based on an existing power dispatching monitoring system. The existing power dispatching monitoring system has the functions of collecting real-time data of the electric energy meter and storing historical data of the electric energy meter and related modules. The electricity larceny detection system is a subsystem running in a server of the power dispatching monitoring system, and is started after the possibility of electricity larceny is detected, and the corresponding electric energy meter is judged to be an electricity larceny meter. After the electricity larceny occurs, the corresponding line loss is increased, so that whether the electricity larceny phenomenon exists or not can be judged through the calculation of the line loss. When detecting that the electric meter has electricity larceny, the system is used for determining the specific electricity larceny electric energy meter.
In the system, the data analysis system 300 is used as a main coordination control system, namely, the data analysis system 300 is a main program module of the electricity larceny detection system. The data analysis system 300 is provided with a data interface, and is connected with the power dispatching system, and after receiving the detection instruction, the data retrieval system 100 is started to extract the electric energy meter data from the power dispatching system. Wherein the reading of data can be performed in different ways depending on the way of detecting theft of electricity. After reading the data, an operational analysis of the data is required, and these intermediate data, as well as some raw and important data, are stored in the data staging system 200. The data analysis system 300 performs calculation and analysis on the data, and finally determines the electric energy meter for stealing electricity, and feeds back the result information to the manager through the information feedback system 400. The information feedback system 400 may be an internet of things communication module or an internet communication module, and is configured to send data information to a manager, and the data analysis system 300 also feeds back the result to the power dispatching system through a data interface. After the information feedback system 400 transmits the detection result as feedback information to the power dispatching system and the operation and maintenance personnel, the corresponding management and maintenance personnel arrive at the accurate position of the electricity stealing electric energy meter, timely and accurately make detection, and obtain corresponding electricity stealing evidence.
The specific detection method comprises the following steps.
And step 1, acquiring information of all electric energy meters in a power supply station area, and setting detection power consumption Wj. After detecting that a certain power supply station area has electricity stealing phenomenon, firstly acquiring information of all electric energy meters of the power supply station area. The electric energy meter information comprises an electric energy meter number, an electric energy meter geographic position, a space position and an electric energy meter function type. These data are read out from the database of the power dispatching system and stored in the data temporary storage system 200. The electric energy meter number is a unique identification of the electric energy meter, and the geographical and spatial positions of the electric energy meter record the specific positions of the electric energy meter, and the information such as the address, the floor, the number meter box and the like of the meter box where the electric energy meter is located. The function type of the electric energy meter is mainly used for judging the function of the electric energy meter, and mainly comprises a metering total meter and a user meter, wherein the metering total meter is the total meter Bz in the application, is a total meter of a transformer outlet of a transformer area, is a total energy consumption of the transformer outlet, and is a household meter, and the user meter is used for metering the electricity consumption of each household.
The detection power consumption is a reference value for detection and judgment, and is used for realizing calculation of subsequent data, which can influence the efficiency of operation analysis. The detection power consumption in the application is 1-25 kilowatt-hours. The detection power consumption in this embodiment is set to 10 kwh.
And 2, determining an association system according to the electric energy meter information, wherein the association system comprises an aggregate meter Bz and a user meter associated with the aggregate meter.
After the information in step 1 is acquired, the association system is determined. A cell may be a cell, and may be provided with a plurality of components according to the size of the cell, and thus may have a plurality of total tables Bz. There can only be one aggregate table in the associated system. After determining the aggregate table, the user table associated therewith needs to be determined. This association system is then calculated. The above is a possible phenomenon of complex areas, and it is required to perform one detection for each associated system.
Step 3, assuming that one user table in the determined association system is a suspicion table Bx and the other user tables are normal tables Bz i Wherein i is [1, n-1]And (3) an integer, wherein n is the total number of user tables in the association system. In the step, the user list in the association system is divided into an inner two part, namely a suspected list and a normal list. And (3) taking the suspicion table Bx as a reference table, taking the suspicion table as a rule and taking the detection power consumption as a standard, determining one detection period, finally determining two detection periods, and then analyzing and calculating data.
1. Taking the first detection period and the second detection period as examples, the first detection period and the second detection period are obtained from historical data.
Step A1, selecting a first starting point ts 1 And reads the first starting point ts 1 And the data of the suspicion table Bx at the moment. For example, 12:00:00 is selected as the first starting point ts 1 The suspected table Bx at this time has a reading 345.66.
Step A2, taking the time T as an interval period, sequentially reading the data of the suspicion table Bx of the interval point of the next time period and combining the data with a first starting point ts 1 Is a difference in the data of (a). The interval period T may be 1s, 2s, 5s, 10s or 20s. For example, t=10s, then the readings of suspicion table Bx of 12:00:10, 12:00:20, 12:00:30, 12:00:40: 40 … … are sequentially read, 345.66, 345.68, 345.77, 345.89, 346.46 … ….
Step A3, reading the time period interval point and the first starting point ts 1 And detecting whether the power consumption is equal.
If the difference is smaller than the detection power consumption, repeatedly reading and calculating the data of the suspicion table of the next time interval point until the data of the suspicion table and the first starting point ts 1 The difference value of the data of the suspicion table is equal to the detection power consumption, and the time point is taken as a first cut-off point tz 1 . For example, when the time period interval point of 12:30:40 is detected, the degree of the suspicion table is 355.55, which can be calculated as the same as the detection power consumption. No matter how large the interval period T is, it is not guaranteed that the difference between the reading at the moment and the reading at the first starting point is the same as the detection power consumption, so that a specific range is satisfied. Wherein the larger the value of the detected power consumption, the larger the allowable range. In this embodiment, the power consumption is detected to be 10 kWh, so that the error is smaller than 0.1The range is just enough. If the detected power consumption is 25 kilowatt-hours, the error range may be 0.25.
If the difference between two adjacent time period interval points is larger than the error range, the data of the time points existing at the two adjacent time period interval points can be read and the proper time point can be found.
Step A4, the first starting point ts 1 And a first cut-off point tz 1 The inter-period is a first detection period.
Step A5, repeating steps A1 to A4 to determine a second detection period. Selecting a second starting point ts 2 Then the method is applied to determine the second starting point ts 2 A second detection period is then determined. Wherein the first starting point and the second starting point are different time points. Further, the first starting point and the second starting point need to satisfy ts 2 -ts 1 ≥tz 1 -ts 1
2. Taking the first detection period and the second detection period as examples, the real-time data is obtained.
Step B1, reading electric energy data of a suspicion table at the current moment, and marking the current moment as a first starting point ts 1
Step B2, sequentially reading the electric energy data of the suspicion table by taking the time T as an interval period, and combining the electric energy data with a first starting point ts 1 And subtracting the electric energy data of the suspicion table at the moment.
Step B3, judging whether the difference value between the reading at the current moment and the reading at the first starting point is the same as the detection power consumption, if so, continuing to read the electric energy data of the suspicion table of the next interval period; when the electric energy data of the suspicion table is combined with the first starting point ts 1 Stopping timing and marking the time as the first cut-off point tz when the difference value of the detected power consumption is the same 1 First starting point ts 1 And a first cut-off point tz 1 The inter-period is a first detection period.
Step B4, determining the second starting point ts in the same manner 2 And a second cut-off point tz 2 And a second start point ts 2 And a second cut-off point tz 2 The inter-period is a second detection period.
Likewise, the second starting point is different from the first starting point.
Further, the electric energy data of the suspicion table are sequentially read by taking the time T as an interval period and are combined with a first starting point ts 1 Subtracting the electric energy data of the suspicion table at the moment and judging that the electric energy data is larger than the starting power consumption Wq, and marking the time point as a second starting point ts if the electric energy data is larger than the starting power consumption 2 The method comprises the steps of carrying out a first treatment on the surface of the Wherein Wq is more than or equal to 0.5Wj.
3. The first detection period and the second detection period are determined on a time basis.
In the two methods, the detection power consumption is first uncertain. Firstly, selecting a time period as a first detection time period, determining the difference value of the degrees of the electric energy meter in the time period, and if the difference value is within the range of the detection power consumption, selecting the difference value as the detection power consumption. Thereafter, the detection power consumption is applied to determine a second detection period.
If the first starting point of the first detection period is 12:00:00 and the first stopping point is 12:30:00, reading the degrees of suspicion tables of the two time points, and making a difference value, wherein the difference value is assumed to be 13.44, the detection power consumption can be calculated at 1-25 kilowatt hours, and the excessive operation amount is too large and too small, so that the 13.44 meets the requirement, and the positioning detection power consumption is realized. The second detection period is then determined using the scheme described above.
And 4, acquiring data of a first detection period, namely acquiring the degrees of the electric energy meter at a first starting point and a first stopping point, and calculating electric energy data, namely the electric energy consumption of a user by making a difference value. At this time, the electric energy data WBx =wj of the suspicion table Bx in the first detection period; at the same time, the method comprises the steps of,
therein, WBz 1 For the total meter power data in the first detection period, ws 1 Bz1 as loss data in the first detection period i And the power data of each normal meter in the first detection period. I.e. the power data WBx of the suspicion table Bx during the first detection period is also equal to the totalTable minus loss data is subtracting the total power usage of the other normal tables.
Step 5, acquiring data of a second detection period, wherein the second detection period and the first detection period are different periods; the power consumption is calculated by obtaining the degrees of the electric energy meter at the first starting point and the first stopping point and making a difference value. Meanwhile, the electric energy data WBx =wj of the suspicion table Bx in the second detection period; at the same time, the method comprises the steps of,
wherein WBz is the electric energy data of the total meter in the second detection period, ws 2 Bz2 for loss data in the second detection period i And the power data of each normal meter in the second detection period.
Step 6, let ws=μ WBz, and bring the formulas in step 4 and step 5 and combine the formulas in step 4 and step 5 into an equation:
calculated to obtain
Wherein mu 1 Coefficients are calculated for the losses when the suspicion table is assumed in step 3. Normally, the line loss ratio is the loss divided by the total power consumption, and is a constant, and in this embodiment, the value is calculated after assuming the value.
Step 7, repeating the steps 3-6, sequentially taking each user table as a suspicion table and calculating a loss calculation coefficient mu corresponding to the suspicion table j Wherein j is [1, n]An integer therebetween.
Step 8, calculating the coefficient mu at the loss j And selecting a minimum value and determining a suspected meter corresponding to the minimum value as an electricity stealing electric energy meter.
If normal tableAs a suspicion table, ws 1 、Ws 2 The losses contained in the electric meter include actual losses and electricity stealing losses of the electricity meter. The loss calculation coefficient calculated at this time will be large.
Because the relation ratio between the electricity larceny quantity and the actual electricity consumption is constant after the electricity larceny meter is changed, whether the electricity larceny meter is accurately metered or not is judged, the actual electricity consumption is the same as long as the metered data are the same in the first detection period and the second detection period, and the analysis and calculation are not influenced as long as the metered data are the same as an intermediate node. Ws if the electricity larceny meter is taken as a suspicion meter 1 、Ws 2 The loss included in the calculation result is only the sum of the actual losses, and the calculated loss calculation coefficient is smaller. Thus, the electricity stealing electric energy meter can be judged. And then the table number of the meter, geographical and spatial position information of the electric energy meter and the like are called, and the information is bound and fed back to a manager through the information feedback system 400.
Preferably, in step 7, the detected power consumption may be different in each cycle.
In summary, the above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application, and the related workers can make various changes and modifications without departing from the scope of the technical idea of the present application. The technical scope of the present application is not limited to the description, but includes all equivalent changes and modifications in shape, construction, characteristics and spirit according to the scope of the claims.

Claims (5)

1. The electricity larceny detection method is characterized by comprising the following steps of:
step 1, selecting a radio station supply area and setting a judging period Tp, wherein the ending point of the judging period Tp is the date of the same day, and the starting point is the date of the forward judging period Tp;
reading the total power consumption Wpz of the power supply station area within a judging period Tp; reading the user power consumption Wpy of all the user electric energy meters in the power supply station area in the judging period Tp n And calculate and useHousehold total valueWherein n is the total number of the user electric energy meters in the power supply station area; the judgment period Tp is 1 day, 1 week or 1 month;
step 2, calculating a power theft abnormal value wq= Wpz-Wyz, and comparing with a power theft early warning threshold Wqy:
when Wq > Wqy, step 3 is performed;
when Wq is less than or equal to Wqy, executing the step 1 after one week of interval;
step 3, setting a detection period Tj, reading the user power consumption Wyn of all the user power meters in the radio supply station area in the detection period Tj, selecting the user power meters with the user power consumption Wyn =0, and removing the user power meters; the detection period Tj is 30 seconds, 1 minute, or 5 minutes;
step 4, reading the user power consumption Wyy of all the user power meters for power consumption within the detection period Tj m And calculate the total value of the electricity usersWherein m is the number of users who use electricity in the detection period Tj, and n-m is more than or equal to 1; meanwhile, the total power consumption Wz of the station area in the detection period Tj is read; in the step 4, when n-m=1 or n-m=2, the step 5 is executed, and when n-m>2, entering the next detection period and executing the step 4;
step 5, calculating a suspected value Wqj =wz-Wyyz of electricity theft, and comparing with an electricity theft early warning threshold Wqx:
when Wqj is more than Wqx, marking the user electric energy meter with electricity as a suspicion meter Bx, and marking the user electric energy meter without electricity as a normal value Bz;
when Wqj is less than or equal to Wqx, marking the user electric energy meter without electricity as a suspected meter Bx and marking the user electric energy meter with electricity as a normal value Bz;
reading the user power consumption Wyn of the user electric energy meter of the suspicion meter Bx in the detection period Tj, selecting and marking the user electric energy meter with the user power consumption Wyn =0, and then executing the step 5;
and when the number of the suspicion tables Bx is 1, determining that the suspicion tables Bx are electricity stealing suspicion tables, and detecting the suspicion tables on site.
2. The big data analysis based intelligent electricity theft detection system of claim 1, wherein:
setting a power supply station area power theft early warning threshold sequence Wqx (t, s), wherein t is a detection period Tj, and s is the number of user electric energy meters for power utilization;
the electricity larceny early warning threshold sequence Wqx (t, s) is correspondingly provided with j storage spaces, and each storage space stores an actual loss early warning threshold Wsh j
When the comparison is needed, searching a storage space corresponding to the detection period Tj and the number of the users who use electricity in the period in an electricity stealing early warning threshold sequence Wqx (t, s) according to the detection period Tj and the number of the users who use electricity in the period, and calculating the average value of the data of the storage space to obtain an electricity stealing early warning threshold valueWherein μ is an early warning coefficient and μ>1。
3. The big data analysis based intelligent electricity theft detection system of claim 1, wherein:
in the step 5:
when Wqj is less than or equal to Wqx, storing Wqj data into j storage spaces corresponding to the detection period Tj and the number of users using electricity in the period, and storing the data into one storage space with earliest time.
4. The big data analysis based intelligent electricity theft detection system of claim 1, wherein:
in the step 3:
the detection period Tj is calculated by extracting historical data in the judgment period Tp;
after the calculation of the detection period Tj is completed, the starting point is set again and the history data of the new detection period Tj is read and calculated until the electricity stealing electric energy meter is found.
5. The big data analysis based intelligent electricity theft detection system of claim 1, wherein:
in the step 3:
the detection period Tj is calculated by accumulating current real-time data after the theft is found, and the start point of the detection period Tj is set to a time point of 11:30 to 13:30 or a time point of 17:00 to 20:00.
CN202310892201.6A 2022-08-02 2022-08-02 Electricity larceny detection method Pending CN116933157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310892201.6A CN116933157A (en) 2022-08-02 2022-08-02 Electricity larceny detection method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202310892201.6A CN116933157A (en) 2022-08-02 2022-08-02 Electricity larceny detection method
CN202210920632.4A CN115270974B (en) 2022-08-02 2022-08-02 Intelligent electricity larceny detection system based on big data analysis

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202210920632.4A Division CN115270974B (en) 2022-08-02 2022-08-02 Intelligent electricity larceny detection system based on big data analysis

Publications (1)

Publication Number Publication Date
CN116933157A true CN116933157A (en) 2023-10-24

Family

ID=83746297

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202310892201.6A Pending CN116933157A (en) 2022-08-02 2022-08-02 Electricity larceny detection method
CN202210920632.4A Active CN115270974B (en) 2022-08-02 2022-08-02 Intelligent electricity larceny detection system based on big data analysis

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202210920632.4A Active CN115270974B (en) 2022-08-02 2022-08-02 Intelligent electricity larceny detection system based on big data analysis

Country Status (1)

Country Link
CN (2) CN116933157A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115826909B (en) * 2023-02-24 2023-05-12 国网山东省电力公司枣庄供电公司 Big data analysis-based electricity larceny detection system
CN116933986B (en) * 2023-09-19 2024-01-23 国网湖北省电力有限公司信息通信公司 Electric power data safety management system based on deep learning

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504508B (en) * 2014-12-15 2018-02-23 国网安徽省电力公司铜陵供电公司 The taiwan area closed-loop data analysis method returned based on step analysis and small echo
GB2561916B (en) * 2017-04-28 2021-09-22 Gb Gas Holdings Ltd Method and system for detecting anomalies in energy consumption
CN108664990B (en) * 2018-03-29 2020-09-18 清华大学 Electricity stealing detection method and device based on comprehensive entropy method and density clustering method
CN111062590A (en) * 2019-12-02 2020-04-24 深圳供电局有限公司 Electricity abnormal behavior detection method and device, computer equipment and storage medium
CN113452145B (en) * 2021-08-30 2022-01-25 广东电网有限责任公司中山供电局 Method and system for monitoring power utilization condition of low-voltage transformer area user

Also Published As

Publication number Publication date
CN115270974A (en) 2022-11-01
CN115270974B (en) 2023-06-30

Similar Documents

Publication Publication Date Title
CN110471024B (en) Intelligent electric meter online remote calibration method based on measurement data analysis
CN116933157A (en) Electricity larceny detection method
WO2018176863A1 (en) Investment efficiency analysis method and device related to power distribution network reliability, and storage medium
CN102436624B (en) A kind of based on the power marketing live traffic treatment scheme of handheld terminal and the method for specification
CN106569164A (en) Method and system for synchronization testing of electric quantity of double-core electric energy meter
CN106338706A (en) Electric energy metering device overall error detecting method, device and system
CN111948596B (en) Online detection method and system for errors of power meter in transformer area based on multiple time scales
JP2015002588A (en) Power consumption management system and method
CN101673363A (en) Method and system for evaluating energy-consuming efficiency
CN109165763A (en) A kind of potential complained appraisal procedure and device of 95598 customer service work order
CN112288303B (en) Method and device for determining line loss rate
CN105203924A (en) Electricity usage trend abnormity suspicion analysis method and anti-electric-larceny monitoring system
WO2014080515A1 (en) Data analyzing device and program
CN114240086A (en) Carbon emission monitoring method and device, storage medium and processor
CN107589391A (en) A kind of methods, devices and systems for detecting electric power meter global error
CN109270316A (en) A kind of power consumer electricity consumption abnormality recognition method, device and terminal device
CN111724060A (en) Integrated analysis monitoring system and analysis method for transformer area line loss
CN108072858B (en) Electric energy meter quality management method and system and terminal equipment
CN113655425A (en) Metering point operation error monitoring method and system suitable for 10KV wiring line
Gulati et al. LEAD1. 0: a large-scale annotated dataset for energy anomaly detection in commercial buildings
CN103020721A (en) Method for evaluating real-time data processing efficiency of power grid dispatching automation system
KR20160074325A (en) Electricity Demand Index (EDI) Forecasting System with respect to Weather Condition Change
KR102269887B1 (en) Power meter reading device and reading method thereof
CN115512488B (en) Time-sharing electricity charge calculation method and device based on flexible rate electric energy meter
CN115826909B (en) Big data analysis-based electricity larceny detection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination